3 large takeaways from the Snyk State of Cloud Safety 2022 Report



Cloud computing has created an even bigger shift within the IT business over the last 20 years than every other issue. With cloud know-how, firms can construct, deploy, and scale their functions quicker than ever. Nevertheless, cloud clients have been struggling a variety of safety occasions throughout the previous 12 months, with information breaches, information leaks, and intrusions into their environments among the many most critical. 

Snyk not too long ago surveyed greater than 400 cloud engineering and safety professionals and leaders throughout numerous organisation varieties and industries. Created in partnership with Propeller Insights, the findings are summarised within the Snyk State of Cloud Safety 2022 report. The report takes a deep dive into the dangers and challenges they face, and the place they’re efficiently addressing these dangers. 

In keeping with the State of Cloud Safety 2022 Report, 80% of organisations suffered a critical incident throughout the final 12 months, and 33% suffered a cloud information breach.The shift to builders constructing and operating apps natively within the cloud is altering cloud safety, in keeping with insights. Within the ensuing report, Snyk’s cloud safety researchers mixed their evaluation of the survey information with observations from their very own expertise. Listed here are the three large takeaways.

Cloud native functions instances deliver new safety challenges — and alternatives

The predominant cloud use case has been as a platform for internet hosting third-party functions or functions migrated out of their information facilities. 1 / 4 of Snyk’s survey respondents indicated that the first use for cloud environments is creating and operating functions natively within the cloud.

Groups utilizing the cloud as a platform have produced a variety of improvements, together with Infrastructure as Code (IaC), the coding course of builders use to construct and handle cloud infrastructure alongside their functions. 

Moreover, builders leveraging the cloud are making growing use of cloud native approaches, akin to containers and serverless “features as a service” architectures. 

These modifications have implications for safety. 41% of groups adopting cloud native approaches confirmed that doing so has elevated their safety complexity. Cloud native approaches additionally require groups so as to add further safety experience and introduce further safety coaching. Cloud native additionally necessitates the adoption of latest safety tooling and methodologies, akin to a “Shift Left” strategy.

However whereas constructing and operating functions within the cloud brings new safety challenges, groups utilizing this strategy are experiencing fewer critical safety incidents. The subsequent two large takeaways from the report assist clarify why. 

Builders are taking possession of cloud safety

Who owns cloud safety? Relying on who you ask, you’re prone to get a distinct reply. Whereas IT owns cloud safety in roughly half of all organisations, 42% of cloud engineers say that their crew is primarily answerable for cloud safety. Nevertheless,  solely 19% of safety professionals agree that engineering groups are doing that work. 

This can be defined by the truth that cloud engineers are investing vital effort and time into cloud safety duties, and so they’re usually on the lookout for methods to automate and streamline these processes. The adoption of infrastructure as code for deploying and managing cloud environments supplies engineers with the chance to search out and repair points in growth moderately than post-deployment, when remediations require extra time and assets.

Builders management the cloud computing infrastructure itself as a result of the cloud is absolutely software-defined. After they construct functions within the cloud, they’re additionally constructing the infrastructure for functions as a substitute of shopping for a pile of infrastructure and including apps. That could be a coding course of utilizing Infrastructure as Code (IaC), and builders personal that course of. 

Infrastructure as code safety delivers an enormous ROI 

IaC safety is a large win — not only for decreasing the speed of misconfiguration, however for bettering engineering crew productiveness and velocity of deployments. Inefficient cloud safety processes usually develop into the rate-limiting issue for how briskly groups can go within the cloud, and IaC safety delivers vital enhancements in velocity and productiveness. 

The median discount within the charge of misconfiguration in operating cloud environments ensuing from IaC safety pre-deployment is 70%. Whereas IaC safety can’t forestall all runtime misconfigurations, a 70% drop is critical, and may decrease the danger for organisations considerably.

That lower within the variety of misconfigurations additionally has a direct affect on cloud engineering productiveness.  As a result of these groups can scale back the period of time they should spend money on managing and remediating issues, they’ll spend extra time constructing and including worth to the organisation. 

What efficient cloud safety groups are doing

A transparent majority of cloud safety and engineering professionals imagine that the danger of a cloud information breach at their organisation will improve over the subsequent 12 months, with solely 20% anticipating dangers to lower.

Efficient cloud safety requires stopping misconfigurations and architectural design vulnerabilities that make cloud assaults attainable. Success requires specializing in these 5  basic areas: 

  1. Know your setting. Preserve consciousness of the configuration state of your cloud setting in full context with the functions it runs and the SDLC used to develop, deploy, and handle it. 
  • Give attention to prevention and safe design. Forestall the situations that make cloud breaches attainable, together with useful resource misconfigurations and architectural design flaws. You’ll be able to’t depend on the flexibility to detect and stop assaults in progress. 
  • Empower cloud builders to construct and function securely. When engineers develop safe infrastructure as code, they’ll keep away from time-consuming remediations and rework later, whereas delivering safe infrastructure quicker.
  • Align and automate with coverage as code (PaC): In case your safety insurance policies are expressed solely in human language, they may as effectively not exist in any respect. With PaC, you possibly can specific insurance policies in a language different applications can use to validate correctness, and also you’ll align all stakeholders to function beneath a single supply of belief on safety coverage.  
  • Measure what issues: determine what issues essentially the most, be it decreasing the speed of misconfiguration, rushing up approval processes, or bettering crew productiveness. Safety groups ought to set up safety baselines, set targets, measure progress, and be able to reveal the safety of their cloud setting at any time.

Following these 5 steps permits safety and engineering groups to work collectively to operationalise cloud safety, which reduces threat, accelerates innovation, and improves crew productiveness.